SlideShare a Scribd company logo
EIGRP Authentication & Load
Balancing
EIGRP Authentication
• EIGRP authentication is used to prevent an attacker from
forming the EIGRP neighbor relationship with your router and
advertising incorrect routing information. By using the same
preshared key (PSK) on all routers you can force EIGRP to
authenticate every EIGRP message. That way you can
ensure that your router accepts routing updates only from
trusted sources. To authenticate every message, the MD5
(Message Digest 5) algorithm is used.
• Three steps are required to configure EIGRP authentication:
1. creating a keychain
2. specifying a key string for a key
3. configuring EIGRP to use authentication
• EIGRP uses the concept of key chains. Each key chain can
have many keys, just like in real life. You can specify a
different lifetime interval of each key. That way the second key
in a key chain can be used after the first one is expired, the
third one after the second and so on. After you have created a
key chain with the corresponding keys, you need to enable
EIGRP authentication for a particular interface.
• To configure a router to use EIGRP configuration the
following commands are used:
1. (global-config) key chain NAME - creates a keychain
2. (config-keychain) key NUMBER - identifies the key number
3. (config-keychain-key) key-string STRING - specifies the
key string for the key
• Next, we need to enable EIGRP authentication on an
interface. From the interface mode, the following commands
are used:
4. (config-if) ip authentication mode eigrp ASN md5 - enables
EIGRP authentication on the interface
5. (config-if) ip authentication key-chain eigrp ASN
KEY_CHAIN_NAME - specifies the name of the key chain that
will be used for authentication
• NOTE - for the authentication to work, the key number and the
key string have to match on both routers! The key chain name
doesn't have to be the same on both routers.
The following example shows how EIGRP authentication is
configured.
• To establish a time frame for the validity of a key, you need to
configure the accept-lifetime and the send-lifetime parameters. The
syntax of the commands is:
(config-keychain-key) accept-lifetime start_time {infinite |
end_time | duration seconds}
(config-keychain-key) send-lifetime start_time {infinite |
end_time | duration seconds} 
• The first command specifies the time period during which the
key will be accepted. The second command specifies the time
period during which the key will be sent.
• For example, if we want to use a key only from January 1st,
2015 to December 1st, 2015, the following commands are
used:
EIGRP load balancing
• By default, EIGRP supports equal-cost load balancing over
four links. Equal-cost means that multiple routes must have
the same metric to reach a destination, so that router can
choose to load balance across equal cost links.
• To better understand the equal-cost load balancing concept,
consider the following example.
• All three routers are running EIGRP. Routers R2 and R3 are
connected to the subnet 10.0.1.0/24. Both routers advertise
the route to reach that subnet to R1. Router R1 receives the
two routing updates for the subnet 10.0.1.0/24 with the same
metric (the metric is the same because both routers connect
to the subnet 10.0.1.0/24 and R1 across the links with the
same bandwidth and delay values). Router R1 places both
routes in the routing table and load balances across three
links.
• You can verify that R1 is indeed using both paths by typing
the show ip route command:
• One of the advantages of EIGRP is that, unlike OSPF and
many other routing protocols, EIGRP also supports unequal-
cost load balancing. You can set up your router to load
balance over links with different metric to reach a
destination. To accomplish unequal-cost load balancing, the
variance command is used. The command takes one
parameter, the multiplier, which tells the router to load
balance across each link with the metric for the destination
less than the feasible distance multiplied by the multiplier
value.
• NOTE - the multiplier value, by default, is 1. The maximum
value is 128.
• Consider the following example.
All three routers are running EIGRP. Routers R2 and R3 are
connected to the subnet 10.0.1.0/24. Both routers advertise
the route to reach that subnet to R1. Router R1 chooses the
route from R2 as the best route. Let's say that R1 calculated
the metric of 40 for the path through R2. That route is placed
in the R1's routing table. But what if we want to load balance
traffic across the other link? The route through R3 has a
feasible distance of 30, which is less than the metric of the
successor route, so the feasibility condition has been met
and that route has been placed in the R1's topology table.
Let's say that R1 calculated the metric of 60 for the route
through R3. To enable load balancing across that link, you
need to use the variance command:
• (router-eigrp) variance MULTIPLIER
• In this example, the variance 2 command can be used. This
tells the router to load balance across any links with the
metric less then 80 (because 40 times 2 is 80). The route
through R3 is added to the routing table.
• NOTE - a path has to be a feasible successor route to be
used in unequal load balancing.
https://www.facebook.com/NetProtocol-Xpert-1459759190925583
https://in.linkedin.com/in/netprotocolxpert
https://plus.google.com/u/0/collection/AYQ-EB
https://branded.me/netprotocolxpert
https://twitter.com/NPX_cisco
Follow Us @

More Related Content

What's hot

OSPF Internal Route Summarization
OSPF Internal Route SummarizationOSPF Internal Route Summarization
OSPF Internal Route Summarization
NetProtocol Xpert
 
OSPF Summary LSA (Type 3 LSA)
OSPF Summary LSA (Type 3 LSA)OSPF Summary LSA (Type 3 LSA)
OSPF Summary LSA (Type 3 LSA)
NetProtocol Xpert
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
NetProtocol Xpert
 
OSPF summary & Differences between OSPF and EIGRP
OSPF summary&Differences between OSPF and EIGRPOSPF summary&Differences between OSPF and EIGRP
OSPF summary & Differences between OSPF and EIGRP
NetProtocol Xpert
 
Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Dân Chơi
 
Redistribution into OSPF
Redistribution into OSPFRedistribution into OSPF
Redistribution into OSPF
NetProtocol Xpert
 
Igrp
IgrpIgrp
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
selvakumar_b1985
 
1 egp
1 egp1 egp
1 egp
PAF-KIET
 
BGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route MapBGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route Map
NetProtocol Xpert
 
Redistribution into EIGRP with Route Maps
Redistribution into EIGRP with Route MapsRedistribution into EIGRP with Route Maps
Redistribution into EIGRP with Route Maps
NetProtocol Xpert
 
Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Dân Chơi
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
anilinvns
 
EIGRP Routing Protocols
EIGRP Routing ProtocolsEIGRP Routing Protocols
EIGRP Routing Protocols
sul6an14
 
IP ROUTING
IP ROUTINGIP ROUTING
IP ROUTING
anilinvns
 
Ccn pv7 route_sba-student-exam-4
Ccn pv7 route_sba-student-exam-4Ccn pv7 route_sba-student-exam-4
Ccn pv7 route_sba-student-exam-4
Alejandro Perez
 
Day 8 2 distance vector routing
Day 8 2 distance vector routingDay 8 2 distance vector routing
Day 8 2 distance vector routing
CYBERINTELLIGENTS
 
Eigrp new
Eigrp newEigrp new
LAYER 2 SWITCHING
LAYER 2 SWITCHINGLAYER 2 SWITCHING
LAYER 2 SWITCHING
anilinvns
 

What's hot (20)

OSPF Internal Route Summarization
OSPF Internal Route SummarizationOSPF Internal Route Summarization
OSPF Internal Route Summarization
 
OSPF Summary LSA (Type 3 LSA)
OSPF Summary LSA (Type 3 LSA)OSPF Summary LSA (Type 3 LSA)
OSPF Summary LSA (Type 3 LSA)
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
 
OSPF summary & Differences between OSPF and EIGRP
OSPF summary&Differences between OSPF and EIGRPOSPF summary&Differences between OSPF and EIGRP
OSPF summary & Differences between OSPF and EIGRP
 
Eigrp
EigrpEigrp
Eigrp
 
Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011
 
Redistribution into OSPF
Redistribution into OSPFRedistribution into OSPF
Redistribution into OSPF
 
Igrp
IgrpIgrp
Igrp
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
1 egp
1 egp1 egp
1 egp
 
BGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route MapBGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route Map
 
Redistribution into EIGRP with Route Maps
Redistribution into EIGRP with Route MapsRedistribution into EIGRP with Route Maps
Redistribution into EIGRP with Route Maps
 
Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
 
EIGRP Routing Protocols
EIGRP Routing ProtocolsEIGRP Routing Protocols
EIGRP Routing Protocols
 
IP ROUTING
IP ROUTINGIP ROUTING
IP ROUTING
 
Ccn pv7 route_sba-student-exam-4
Ccn pv7 route_sba-student-exam-4Ccn pv7 route_sba-student-exam-4
Ccn pv7 route_sba-student-exam-4
 
Day 8 2 distance vector routing
Day 8 2 distance vector routingDay 8 2 distance vector routing
Day 8 2 distance vector routing
 
Eigrp new
Eigrp newEigrp new
Eigrp new
 
LAYER 2 SWITCHING
LAYER 2 SWITCHINGLAYER 2 SWITCHING
LAYER 2 SWITCHING
 

Similar to EIGRP Authentication & Load Balancing

Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)
CCNAResources
 
CCNA ppt Day 5
CCNA ppt Day 5CCNA ppt Day 5
CCNA ppt Day 5
VISHNU N
 
EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)
Netwax Lab
 
EIGRP Protocol.pptx
EIGRP Protocol.pptxEIGRP Protocol.pptx
EIGRP Protocol.pptx
AhmedEssam352399
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
Netwax Lab
 
Route Redistribution
Route RedistributionRoute Redistribution
Route Redistribution
Netwax Lab
 
Packet Tracer: Routing protocols EIGRP and OSPF
Packet Tracer: Routing protocols EIGRP and OSPFPacket Tracer: Routing protocols EIGRP and OSPF
Packet Tracer: Routing protocols EIGRP and OSPF
Rafat Khandaker
 
Routing Protocol EIGRP
Routing Protocol EIGRPRouting Protocol EIGRP
Routing Protocol EIGRP
Dmitry Figol
 
Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014Đồng Quốc Vương
 
Administrative Distance & Metric
Administrative Distance & MetricAdministrative Distance & Metric
Administrative Distance & Metric
NetProtocol Xpert
 
Testing tool for an automated ticketing system
Testing tool for an automated ticketing systemTesting tool for an automated ticketing system
Testing tool for an automated ticketing system
VladimirZitoli
 
Group 1
Group 1Group 1
Group 1
lifetobeart
 
EIGRP ZERO TO HERO
EIGRP ZERO TO HEROEIGRP ZERO TO HERO
EIGRP ZERO TO HERO
BhanviSonkar
 
Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)
CCNAResources
 
Performance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRPPerformance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRP
IRJET Journal
 
Routing Protocol in detail
Routing Protocol in detailRouting Protocol in detail
Routing Protocol in detail
Dil_E_Dastan
 
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOLEnhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Nutan Singh
 

Similar to EIGRP Authentication & Load Balancing (20)

Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)
 
CCNA ppt Day 5
CCNA ppt Day 5CCNA ppt Day 5
CCNA ppt Day 5
 
EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)
 
EIGRP Protocol.pptx
EIGRP Protocol.pptxEIGRP Protocol.pptx
EIGRP Protocol.pptx
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
 
Route Redistribution
Route RedistributionRoute Redistribution
Route Redistribution
 
Packet Tracer: Routing protocols EIGRP and OSPF
Packet Tracer: Routing protocols EIGRP and OSPFPacket Tracer: Routing protocols EIGRP and OSPF
Packet Tracer: Routing protocols EIGRP and OSPF
 
6978106.ppt
6978106.ppt6978106.ppt
6978106.ppt
 
Routing Protocol EIGRP
Routing Protocol EIGRPRouting Protocol EIGRP
Routing Protocol EIGRP
 
Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014
 
Administrative Distance & Metric
Administrative Distance & MetricAdministrative Distance & Metric
Administrative Distance & Metric
 
Testing tool for an automated ticketing system
Testing tool for an automated ticketing systemTesting tool for an automated ticketing system
Testing tool for an automated ticketing system
 
13. eigrp and ospf
13. eigrp and ospf13. eigrp and ospf
13. eigrp and ospf
 
Group 1
Group 1Group 1
Group 1
 
EIGRP ZERO TO HERO
EIGRP ZERO TO HEROEIGRP ZERO TO HERO
EIGRP ZERO TO HERO
 
Eigrp
EigrpEigrp
Eigrp
 
Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)Building Scalable Cisco Internetworks (Bsci)
Building Scalable Cisco Internetworks (Bsci)
 
Performance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRPPerformance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRP
 
Routing Protocol in detail
Routing Protocol in detailRouting Protocol in detail
Routing Protocol in detail
 
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOLEnhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
 

More from NetProtocol Xpert

Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
NetProtocol Xpert
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
NetProtocol Xpert
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
NetProtocol Xpert
 
Storm-Control
Storm-ControlStorm-Control
Storm-Control
NetProtocol Xpert
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
NetProtocol Xpert
 
IP Source Guard
IP Source Guard IP Source Guard
IP Source Guard
NetProtocol Xpert
 
DHCP Snooping
DHCP SnoopingDHCP Snooping
DHCP Snooping
NetProtocol Xpert
 
Password Recovery
Password RecoveryPassword Recovery
Password Recovery
NetProtocol Xpert
 
Application & Data Center
Application & Data CenterApplication & Data Center
Application & Data Center
NetProtocol Xpert
 
Cisco ISR 4351 Router
Cisco ISR 4351 RouterCisco ISR 4351 Router
Cisco ISR 4351 Router
NetProtocol Xpert
 
Cisco ASR 1001-X Router
Cisco ASR 1001-X RouterCisco ASR 1001-X Router
Cisco ASR 1001-X Router
NetProtocol Xpert
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
NetProtocol Xpert
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
NetProtocol Xpert
 
Avoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a commandAvoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a command
NetProtocol Xpert
 
TCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and SwitchesTCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and Switches
NetProtocol Xpert
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
NetProtocol Xpert
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
NetProtocol Xpert
 
OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
NetProtocol Xpert
 
Cisco OTV 
Cisco OTV Cisco OTV 
Cisco OTV 
NetProtocol Xpert
 
OTV(Overlay Transport Virtualization)
OTV(Overlay  Transport  Virtualization)OTV(Overlay  Transport  Virtualization)
OTV(Overlay Transport Virtualization)
NetProtocol Xpert
 

More from NetProtocol Xpert (20)

Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
 
Storm-Control
Storm-ControlStorm-Control
Storm-Control
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
 
IP Source Guard
IP Source Guard IP Source Guard
IP Source Guard
 
DHCP Snooping
DHCP SnoopingDHCP Snooping
DHCP Snooping
 
Password Recovery
Password RecoveryPassword Recovery
Password Recovery
 
Application & Data Center
Application & Data CenterApplication & Data Center
Application & Data Center
 
Cisco ISR 4351 Router
Cisco ISR 4351 RouterCisco ISR 4351 Router
Cisco ISR 4351 Router
 
Cisco ASR 1001-X Router
Cisco ASR 1001-X RouterCisco ASR 1001-X Router
Cisco ASR 1001-X Router
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
 
Avoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a commandAvoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a command
 
TCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and SwitchesTCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and Switches
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
 
OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
 
Cisco OTV 
Cisco OTV Cisco OTV 
Cisco OTV 
 
OTV(Overlay Transport Virtualization)
OTV(Overlay  Transport  Virtualization)OTV(Overlay  Transport  Virtualization)
OTV(Overlay Transport Virtualization)
 

Recently uploaded

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
itech2017
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 

Recently uploaded (20)

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 

EIGRP Authentication & Load Balancing

  • 1. EIGRP Authentication & Load Balancing
  • 2. EIGRP Authentication • EIGRP authentication is used to prevent an attacker from forming the EIGRP neighbor relationship with your router and advertising incorrect routing information. By using the same preshared key (PSK) on all routers you can force EIGRP to authenticate every EIGRP message. That way you can ensure that your router accepts routing updates only from trusted sources. To authenticate every message, the MD5 (Message Digest 5) algorithm is used. • Three steps are required to configure EIGRP authentication: 1. creating a keychain 2. specifying a key string for a key 3. configuring EIGRP to use authentication
  • 3. • EIGRP uses the concept of key chains. Each key chain can have many keys, just like in real life. You can specify a different lifetime interval of each key. That way the second key in a key chain can be used after the first one is expired, the third one after the second and so on. After you have created a key chain with the corresponding keys, you need to enable EIGRP authentication for a particular interface. • To configure a router to use EIGRP configuration the following commands are used: 1. (global-config) key chain NAME - creates a keychain 2. (config-keychain) key NUMBER - identifies the key number 3. (config-keychain-key) key-string STRING - specifies the key string for the key
  • 4. • Next, we need to enable EIGRP authentication on an interface. From the interface mode, the following commands are used: 4. (config-if) ip authentication mode eigrp ASN md5 - enables EIGRP authentication on the interface 5. (config-if) ip authentication key-chain eigrp ASN KEY_CHAIN_NAME - specifies the name of the key chain that will be used for authentication • NOTE - for the authentication to work, the key number and the key string have to match on both routers! The key chain name doesn't have to be the same on both routers.
  • 5. The following example shows how EIGRP authentication is configured. • To establish a time frame for the validity of a key, you need to configure the accept-lifetime and the send-lifetime parameters. The syntax of the commands is: (config-keychain-key) accept-lifetime start_time {infinite | end_time | duration seconds} (config-keychain-key) send-lifetime start_time {infinite | end_time | duration seconds} 
  • 6. • The first command specifies the time period during which the key will be accepted. The second command specifies the time period during which the key will be sent. • For example, if we want to use a key only from January 1st, 2015 to December 1st, 2015, the following commands are used:
  • 7. EIGRP load balancing • By default, EIGRP supports equal-cost load balancing over four links. Equal-cost means that multiple routes must have the same metric to reach a destination, so that router can choose to load balance across equal cost links. • To better understand the equal-cost load balancing concept, consider the following example.
  • 8. • All three routers are running EIGRP. Routers R2 and R3 are connected to the subnet 10.0.1.0/24. Both routers advertise the route to reach that subnet to R1. Router R1 receives the two routing updates for the subnet 10.0.1.0/24 with the same metric (the metric is the same because both routers connect to the subnet 10.0.1.0/24 and R1 across the links with the same bandwidth and delay values). Router R1 places both routes in the routing table and load balances across three links.
  • 9. • You can verify that R1 is indeed using both paths by typing the show ip route command:
  • 10. • One of the advantages of EIGRP is that, unlike OSPF and many other routing protocols, EIGRP also supports unequal- cost load balancing. You can set up your router to load balance over links with different metric to reach a destination. To accomplish unequal-cost load balancing, the variance command is used. The command takes one parameter, the multiplier, which tells the router to load balance across each link with the metric for the destination less than the feasible distance multiplied by the multiplier value. • NOTE - the multiplier value, by default, is 1. The maximum value is 128.
  • 11. • Consider the following example.
  • 12. All three routers are running EIGRP. Routers R2 and R3 are connected to the subnet 10.0.1.0/24. Both routers advertise the route to reach that subnet to R1. Router R1 chooses the route from R2 as the best route. Let's say that R1 calculated the metric of 40 for the path through R2. That route is placed in the R1's routing table. But what if we want to load balance traffic across the other link? The route through R3 has a feasible distance of 30, which is less than the metric of the successor route, so the feasibility condition has been met and that route has been placed in the R1's topology table. Let's say that R1 calculated the metric of 60 for the route through R3. To enable load balancing across that link, you need to use the variance command: • (router-eigrp) variance MULTIPLIER
  • 13. • In this example, the variance 2 command can be used. This tells the router to load balance across any links with the metric less then 80 (because 40 times 2 is 80). The route through R3 is added to the routing table. • NOTE - a path has to be a feasible successor route to be used in unequal load balancing.